client-certificate-auth Vulnerable to Open Redirect via Host Header Injection in HTTP-to-HTTPS redirect
基本資訊
- GHSA ID: GHSA-m4w9-gch5-c2g4
- CVE ID: CVE-2026-25651
- 嚴重性: MEDIUM
- 發布時間: 2026-02-06T18:54:33Z
- 來源: GitHub Advisory
漏洞描述
Summary
Versions 0.2.1 and 0.3.0 of client-certificate-auth contain an open redirect vulnerability. The middleware unconditionally redirects HTTP requests to HTTPS using the unvalidated Host header, allowing an attacker to redirect users to arbitrary domains.
Vulnerable Code
// lib/clientCertificateAuth.js (versions 0.2.1, 0.3.0)
if (!req.secure && req.header('x-forwarded-proto') != 'https') {
return res.redirect('https://' + req.header('host') + req.url);
}
Attack Scenario
- Attacker crafts a link:
http://vulnerable-app.example.com/login - When victim clicks, attacker intercepts and injects header:
Host: attacker.com - Server responds:
302 Found → https://attacker.com/login - Victim is redirected to attacker-controlled site
Impact
- Phishing: Attackers can use trusted domain links to redirect victims to credential-harvesting pages
- OAuth/SSO Token Theft: In authentication flows, authorization codes or tokens may leak via redirect
- Referer Leakage: Sensitive URL parameters may be exposed to attacker domains via the Referer header
- Cache Poisoning: In deployments with shared caches, malicious redirects may be cached and served to other users
Exploitability
Exploitation requires that HTTP traffic reaches the Node.js application without TLS termination setting x-forwarded-proto: https. This condition is uncommon in production deployments behind modern reverse proxies or load balancers, which limits real-world exploitability.
Fix
The vulnerable redirect behavior has been completely removed in version 1.0.0.
npm install client-certificate-auth@^1.0.0
Workarounds
If upgrading is not immediately possible:
- Block HTTP traffic at the network/load balancer level
- Ensure your reverse proxy always sets
x-forwarded-proto: https - Add middleware before
clientCertificateAuthto validate theHostheader against an allowlist
References
影響範圍
- npm:client-certificate-auth (>= 0.2.1, < 1.0.0) → 1.0.0
CVSS 評分
- CVSS v3: 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CWE 分類
- CWE-601: URL Redirection to Untrusted Site (‘Open Redirect’)
EPSS 評分
- EPSS: N/A
萃取備註
- 資料來源: GitHub Security Advisories Database
- 信心水準: 高(官方漏洞資料庫)
- 處理時間: 2026-02-08T07:47:57.317948